Spy Virus Linked to Israel Targeted Hotels - Article Example

Comments (0) Cite this document
In the paper “Spy Virus Linked to Israel Targeted Hotels” the author analyzes the case for the cyber security firm Kaspersky, which following its cognizance of a successful hack on its computers and networks, sought to find out who else fall victim to the attack…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Spy Virus Linked to Israel Targeted Hotels
Read TextPreview

Extract of sample "Spy Virus Linked to Israel Targeted Hotels"

Spy Virus Linked to Israel Targeted Hotels
Individuals and companies trust Cyber security firms across the world because of their ability to protect their computers from viruses. Regrettably, when the cyber security firms, in their capacity, are under threat from attackers, it turns out to be a security crisis. This was the case for the cyber security firm Kaspersky, which following its cognizance of a successful hack on its computers and networks, sought to find out who else fall victim to the attack. Surprisingly, three European hotels that had hosted negotiations between Iran and other world powers over the restriction of the production of nuclear weapons had also been attacked. Kaspersky was quick to link the new virus to Israeli following a previous virus attack dubbed “Duqu”, which had a level of sophistication similar to that of the newly identified virus. Even though Israeli had publicly declined projecting any cyber attack on the U.S. and its allies, it admitted that it was “conducting close surveillance on Iranians” (Entous and Yadron, 2015). Rather than curtailing the production of nuclear weapons, Israeli suspects that the resulting deal could allow Iran to carry on its production of nuclear weapons, hence the spying on the closed-door meetings.
Moreover, Israeli has previously targeted events attended by prominent world leaders, and the fact that the virus was also in computers utilized in the commemoration of the 70th anniversary of the Nazi death camp confirmed the suspicion that Israeli was behind the cyber attack. Even so, the degree of sophistication of the virus has made it difficult for security experts to determine what kind of information the hackers stole. In fact, security experts estimate that it could take ten adept computer scientists “more than two years to build such a clean copycat” (Entous and Yadron, 2015). Overall, Kaspersky is relentlessly attempting to study the manner in which this sophisticated virus works before embarking on a mission to establish powerful antivirus programs to protect customers from cyber security vulnerability.
Cyber criminality has been around for a long time. However, what is striking is that hackers are taking their ‘game’ to a completely new level. Hackers have come to learn that by targeting security companies, they can learn quite a great deal about internet defenses. For instance, Kaspersky was a victim to the attack since the Israeli had a hint that Kaspersky antivirus programs protected the networks and computers in the target hotels. Following a successful attack on Kaspersky, it would be easy for the hackers to spy on their desired information. Verdonck (2015) affirms that hackers target the most vulnerable links in the company, who are the people. Kaspersky was no exception since employees un-suspiciously opened emails that had embedded viruses (Entous and Yadron, 2015).
What is more, the situation is even worse because the degree of sophistication that the hackers have demonstrated is unprecedented and it poses a wakeup call for security experts to provide customers with cutting-edge antivirus programs to protect them from data bleaches, a menace that has been increasingly associated with the present-day business world (Steinberg, 2011). In fact, if Kaspersky had its employees trained properly on matters of cyber security, the hackers would have been unsuccessful in their attacks. For that reason, the discipline of cyber security ought to start with the employees, who are overly vulnerable and targets of the attackers. In addition, rather than learning from an attack from time to time, Kaspersky and other cyber security firms should intensify their level of sophistication as well to fully protect their clients from attacks.
Entous, A. & Yadron, D. (2015, July 10). Spy virus linked to Israel targeted hotels used for Iran
Nuclear talks. The Wall Street Journal. Retrieved from
Steinberg, R. (2011). Governance, risk management, and compliance: It can't happen to us—
avoiding corporate disaster while driving success. Hoboken, N.J: Wiley.
Verdonck, C. (2015). Cyber security. Deloitte. Retrieved from Read More
Cite this document
  • APA
  • MLA
(“Spy Virus Linked to Israel Targeted Hotels Article”, n.d.)
Spy Virus Linked to Israel Targeted Hotels Article. Retrieved from
(Spy Virus Linked to Israel Targeted Hotels Article)
Spy Virus Linked to Israel Targeted Hotels Article.
“Spy Virus Linked to Israel Targeted Hotels Article”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Spy Virus Linked to Israel Targeted Hotels

Ebola virus

...on to consume. This is an indirect way of transmission, starting out with the natural host, and then progressing to the animal population. It is very rare that a human catches the virus from the natural host or reservoirs (Williams, 1999). Specific outbreaks of Ebola can typically be linked to a simple case of a human touching a dead gorilla, monkey, or chimpanzee. Once this first transmission takes place, the virus then transmits itself by person-to-person. Human transmission usually takes place in families, and is also more likely in hospitals and mortuaries, where contact with infected victims is greatest (King, 2010). The signs and symptoms of the Ebola virus can...
4 Pages(1000 words)Essay

Cyber Security: Stuxnet Virus Attack

...? Cyber Security: Stuxnet Virus Attack Cyber Security: Stuxnet Virus Stuxnet refers to a self replicating malware that induced the attention of technological experts in June 2010. Experts have not unraveled the source of this virus. Hackers continuously use different computer worms to subvert targeted sites and systems. Cyber security technologists discovered that the malware tends to be transmitted via Microsoft Windows and specifically infects software and equipment manufactured by technological giants Siemens (Siemens, 2010, p. 2). This unusual virus contains a programmable logic controller (PLC) root kit. The malware appears to spread indiscriminately...
4 Pages(1000 words)Research Paper

Targeted Work Class

..., required skills and knowledge to implement the plans as required by the management. The power behind the success of the overall position in the market requires the right skills, knowledge and experienced persons who guarantee a continuation of the business into the future. For example, if our organization was a hotel; a link between the management and the employees should be established. This link passes the information from top management to the staff requiring their focus in the implementation of the plans. A personnel manager is therefore very important in the hotel, where they carry the responsibility of ensuring that the hired staff is well motivated, and informed...
4 Pages(1000 words)Research Paper


3 Pages(750 words)Essay

Boutique Hotels vs. Chain Hotels

...followed suit and the Mariott, Radisson, Hyatt, Ramada, Hilton and Howard Johnson came into existence. Perceptively, brand awareness for these chain hotels yields a customer base that patronizes the brand as a whole but with concurrent disadvantaged for the franchisees and the franchisor (Langois 7-9). On the other hand, independent hotels such as boutique hotels thrive by providing a unique brand that caters to a particular niche in the market by taking advantage of a good location, a personalized level of service and a different offering specifically for its target market. Technology has afforded boutique hotels to develop their individual brands to...
4 Pages(1000 words)Essay

Computer virus

...IT Security Considering the Enterprise Benefits affiliation IT Security Considering the Enterprise Benefits Working in the internet and the spreading of the IT technologies can bring many risks to the data which firm of enterprise possess and in many cases, other companies can hire attackers to copy some confidential information regarding the plans of the company’s development or to undermine company’s activity (Whitman). To achieve these targets attackers can use online attack on the main resource if we deal with the web shop, internet enterprise. If we work with the company that has access to the internet and work with it very often we should underline infecting the computer with viruses or backdoors, special...
1 Pages(250 words)Coursework

To Spy Or Not To Spy

...To Spy or Not To Spy To Spy or Not To Spy 5.7 Concluding Comments Summarizes Major Issues/Problems The company has a new CEO and the new CEO has come up with new ideas of improving the performance of the company by installing spyware devices throughout the organization that will monitor the performance and output of workers while at their workstations. However, there is a fallout within the executive management, as well as the board of directors as the other managers and directors do not buy the idea proposed by the new CEO. Furthermore, the employees are against this decision too, as it instills fear and doubt amongst them especially coming from the management of the...
3 Pages(750 words)Essay

Haiyi Hotels the target market and the location. The Chief Executive Officer (CEO) of Haiyi hotels – comprising Best Western Americanas, Carriage Inn, Good Hotel, Hotel Metropolis and Hotel Vertigo – is the vision carrier and overseer. He holds the primary responsibility for defining and implementing strategies aimed at realizing the vision of the company. The vision of Haiyi Hotels is more of a concept than a particular goal. The attainment of the vision of this organization is a result of a myriad of ideas laid out in the core values of the company. First, the company’s executive’s commitment to offering effective leadership, will propel the...
1 Pages(250 words)Assignment

To Spy or Not to Spy

...To Spy or Not to Spy Affiliation Key Decision Makers Within the case involving Globe AIive, Inc., the key decision makers include Helmut Schwartz, Patrick Photo, Stan Ryder, Stuart Miller, Ali Khan, and Thuy Singh. Schwartz was the incoming CEO to replace the outgoing CEO, Stan Ryder. Patrick Photo is the operations manager while Thuy and Ali are production and marketing managers respectively. Miller is the HR Director while Photo is the operations manager. Each of these individuals hold a specific decision-making position within GAI. Based on pressure from competition and the need to ensure that the company is as productive as possible, the incoming CEO intends to implement changes which will require...
2 Pages(500 words)Case Study

Globetrotting Hotels of the business. Globetrotting Hotels needs collaborative network and electronic supply chain management that can connect all origination and hotels chain that is linked to the Globetrotting Hotels new technology based business. 6- Attracting and retaining customers to an online business Attracting as well as retaining consumers online our clientele may determine us and be prepared to set up a conversation, excluding if our online presence does not hold them, we will be unable to find them more time. In this state of affairs we have to investigate the methods to revive our online attendance through spotlighting on plans to attach through clientele by...
13 Pages(3250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Article on topic Spy Virus Linked to Israel Targeted Hotels for FREE!

Contact Us